forked from wolfSSL/wolfssl
Fix typos for dynamic types in dtls13.c.
This commit is contained in:
@@ -523,7 +523,7 @@ static int Dtls13SendFragment(WOLFSSL* ssl, byte* output, word16 output_size,
|
||||
static void Dtls13FreeFragmentsBuffer(WOLFSSL* ssl)
|
||||
{
|
||||
XFREE(ssl->dtls13FragmentsBuffer.buffer, ssl->heap,
|
||||
DYNAMIC_TYPE_TEMP_BUFFER);
|
||||
DYNAMIC_TYPE_TMP_BUFFER);
|
||||
ssl->dtls13FragmentsBuffer.buffer = NULL;
|
||||
ssl->dtls13SendingFragments = 0;
|
||||
ssl->dtls13MessageLength = ssl->dtls13FragOffset = 0;
|
||||
@@ -664,7 +664,7 @@ static void Dtls13RtxFlushAcks(WOLFSSL* ssl)
|
||||
while (list != NULL) {
|
||||
rn = list;
|
||||
list = rn->next;
|
||||
XFREE(rn, ssl->heap, DYNAMIC_TYEP_DTLS_MSG);
|
||||
XFREE(rn, ssl->heap, DYNAMIC_TYPE_DTLS_MSG);
|
||||
}
|
||||
|
||||
ssl->dtls13Rtx.seenRecords = NULL;
|
||||
@@ -710,7 +710,7 @@ static void Dtls13RtxRemoveCurAck(WOLFSSL* ssl)
|
||||
if (w64Equal(rn->epoch, ssl->keys.curEpoch64) &&
|
||||
w64Equal(rn->seq, ssl->keys.curSeq)) {
|
||||
*prevNext = rn->next;
|
||||
XFREE(rn, ssl->heap, DYNAMIC_TYEP_DTLS_MSG);
|
||||
XFREE(rn, ssl->heap, DYNAMIC_TYPE_DTLS_MSG);
|
||||
return;
|
||||
}
|
||||
|
||||
|
Reference in New Issue
Block a user